Wissenschaftliche Artikel

Eckhart, M., Ekelhart, A., Biffl, S., Lüder, A., & Weippl, E. R. (2022). QualSec: An Automated Quality-Driven Approach for Security Risk Identification in Cyber-Physical Production Systems. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2022.3193119 ( reposiTUm)
Eckhart, M., Ekelhart, A., & Weippl, E. (2020). Automated Security Risk Identification Using AutomationML-based Engineering Data. IEEE Transactions on Dependable and Secure Computing, 19(3), 1655–1672. https://doi.org/10.1109/tdsc.2020.3033150 ( reposiTUm)
Wenzl, M., Merzdovnik, G., Ullrich, J. M. M., & Weippl, E. (2019). From Hack to Elaborate Technique—A Survey on Binary Rewriting. ACM Computing Surveys, 52(3), 1–37. https://doi.org/10.1145/3316415 ( reposiTUm)
Eckhart, M., Brenner, B., Ekelhart, A., & Weippl, E. (2019). Quantitative Security Risk Assessment for Industrial Control Systems: Research Opportunities and Challenges. Journal of Internet Services and Information Security, 9(3), 52–73. https://doi.org/10.22667/JISIS.2019.08.31.052 ( reposiTUm)
Rupprecht, D., Dabrowski, A., Holz, T., Weippl, E., & Pöpper, C. (2018). On Security Research Towards Future Mobile Network Generations. IEEE Communications Surveys and Tutorials, 20(3), 2518–2542. https://doi.org/10.1109/comst.2018.2820728 ( reposiTUm)
Dabrowski, A., Ullrich, J., & Weippl, E. R. (2018). Botnets causing blackouts: How Coordinated load attacks can destabilize the power grid. Elektrotechnik Und Informationstechnik : E & i, 135(3), 250–255. https://doi.org/10.1007/s00502-018-0618-3 ( reposiTUm)
Ullrich, J., Zseby, T., Fabini, J., & Weippl, E. (2017). Network-Based Secret Communication in Clouds: A Survey. IEEE Communications Surveys and Tutorials, 19(2), 1112–1144. https://doi.org/10.1109/comst.2017.2659646 ( reposiTUm)
Islam, S., Fenz, S., Weippl, E., & Mouratidis, H. (2017). A Risk Management Framework for Cloud Migration Decision Support. Journal of Risk and Financial Management, 10(2), 10. https://doi.org/10.3390/jrfm10020010 ( reposiTUm)
Islam, S., Fenz, S., Weippl, E., & Kalloniatis, C. (2016). Migration Goals and Risk Management in Cloud Computing: A review of State of the Art and Survey Results on Practitioners. International Journal of Secure Software Engineering, 7(3), 44–73. https://doi.org/10.4018/ijsse.2016070103 ( reposiTUm)
Kieseberg, P., Malle, B., Frühwirt, P., Holzinger, A., & Weippl, E. (2016). A tamper-proof audit and control system for the doctor in the loop. Brain Informatics, 3(4), 269–279. http://hdl.handle.net/20.500.12708/150119 ( reposiTUm)
Neuner, S., Schmiedecker, M., & Weippl, E. (2016). Effectiveness of file‐based deduplication in digital forensics. Security and Communication Networks, 9(15), 2876–2885. http://hdl.handle.net/20.500.12708/150121 ( reposiTUm)
Ismail, U. M., Islam, S., Ouedraogo, M., & Weippl, E. (2016). A Framework for Security Transparency in Cloud Computing. Future Internet, 8(1). http://hdl.handle.net/20.500.12708/150120 ( reposiTUm)
Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G., & Weippl, E. (2016). Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1), 1–37. https://doi.org/10.1145/2886012 ( reposiTUm)
Ullrich, J., Cropper, J., Frühwirt, P., & Weippl, E. (2016). The and security of firewalls in cyber-physical cloud computing. EURASIP Journal on Information Security, 2016:18(18). http://hdl.handle.net/20.500.12708/150117 ( reposiTUm)
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Echizen, I., & Weippl, E. (2014). An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electronic Markets, 24(2), 113–124. https://doi.org/10.1007/s12525-014-0154-x ( reposiTUm)
Frühwirt, P., Kieseberg, P., Krombholz, K., & Weippl, E. (2014). Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation, 11(4), 336–348. http://hdl.handle.net/20.500.12708/157885 ( reposiTUm)
Hochreiner, C., Frühwirt, P., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 5(3), 44–62. http://hdl.handle.net/20.500.12708/157875 ( reposiTUm)
Krieg, C., Dabrowski, A., Hobel, H., Krombholz, K., & Weippl, E. (2013). Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, 4(2), 1–115. https://doi.org/10.2200/s00530ed1v01y201308spt006 ( reposiTUm)
Anjomshoaa, A., Khue, V. S., Tahamtan, A., Tjoa, A. M., & Weippl, E. (2012). Self-Monitoring in Social Networks. International Journal of Intelligent Information and Database Systems, 6(4), 363. https://doi.org/10.1504/ijiids.2012.049110 ( reposiTUm)
Schwarzl, C., & Weippl, E. (2011). A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. International Journal of Secure Software Engineering, 2(1), 40–83. https://doi.org/10.4018/jsse.2011010103 ( reposiTUm)
Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle Attacks: Exploiting Social Networking Sites for Spam. IEEE Internet Computing, SPECIAL ISSUE ON SECURITY AND PRIVACY IN SOCIAL NETWORKS. http://hdl.handle.net/20.500.12708/162843 ( reposiTUm)
Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems. Interaction Design and Architecture(s) Journal, 9–10, 85–103. http://hdl.handle.net/20.500.12708/168194 ( reposiTUm)
Asfand-E-Yar, M., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). Exploiting Ontology for Software License Agreements. International Journal of Software and Informatics, 4(1), 89–100. http://hdl.handle.net/20.500.12708/167084 ( reposiTUm)
Neubauer, Th., Heurix, J., Min Tjoa, A., & Weippl, E. R. (2010). Pseudonymisierung für die datenschutzkonforme Speicherung medizinischer Daten. Elektrotechnik und Informationstechnik : e & i, 127(5), 135–142. https://doi.org/10.1007/s00502-010-0733-2 ( reposiTUm)
Mulazzani, M., Huber, M., & Weippl, E. (2010). Anonymity & Monitoring: How to Monitor the Infrastructure of an Anonymity System. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 539–546. http://hdl.handle.net/20.500.12708/166270 ( reposiTUm)
Tabatabai Irani, M., & Weippl, E. (2009). Automation Of Post-Exploitation. International Journal of Web Information Systems (IJWIS), 5(4), 518–536. http://hdl.handle.net/20.500.12708/166271 ( reposiTUm)
Weippl, E. (2008). Cyber Attacks and the article 5 of the Treaty of NATO. Euro Atlantic Quartely, 3(4), 22. http://hdl.handle.net/20.500.12708/171290 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M., & Weippl, E. (2008). XML Security - A Comparative Literature Review. Journal of Systems and Software, 81(10), 1715–1724. https://doi.org/10.1016/j.jss.2007.12.763 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., Klemen, M., & Weippl, E. (2007). Architectural approach for handling semi-structured data in an user-centered working environment. International Journal of Web Information Systems (IJWIS), 3(3), 198–211. http://hdl.handle.net/20.500.12708/169637 ( reposiTUm)
Weippl, E. (2007). Dependability in e-assessment. International Journal on E-Learning: Corporate, Government, Healthcare & Higher Education, 6(2), 293–302. http://hdl.handle.net/20.500.12708/169623 ( reposiTUm)
Weippl, E. (2006). Sarbanes-Oxley Act Compliance: Strategies for Implementing a Audit Committee Complaints Procedure. Information Systems Control Journal, 4(10). http://hdl.handle.net/20.500.12708/173392 ( reposiTUm)
Weippl, E., & Tjoa, A. M. (2006). Security Aspects of Ubiquitious Computing in Health Care. Elektrotechnik Und Informationstechnik : E & i, 123(4), 156–161. http://hdl.handle.net/20.500.12708/173391 ( reposiTUm)
Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: Anonymity, pseudonyms and authenticated usage. Interactive Technology and Smart Education (ITSE), 2005(2), 247–256. http://hdl.handle.net/20.500.12708/173359 ( reposiTUm)
Weippl, E. (2005). Security in e-learning. ACM ELearn, 2005, 3. http://hdl.handle.net/20.500.12708/173360 ( reposiTUm)
Nguyen, M. T., Tjoa, A. M., Weippl, E., & Brezany, P. (2005). Toward a Grid-Based Zero-Latency Data Warehousing Implementation for Continuous Data Streams Processing. International Journal of Data Warehousing and Mining, IDEA GROUP(Vol. 1-4), 22–55. http://hdl.handle.net/20.500.12708/173340 ( reposiTUm)

Beiträge in Tagungsbänden

Weippl, E., & Maffei, M. (2024). Message from General Chairs; EuroSP 2024. In 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 9th IEEE European Symposium on Security and Privacy Workshops (EUROS&PW 2024), Wien, Austria. https://doi.org/10.1109/EuroSPW61312.2024.00005 ( reposiTUm)
Goldenits, G., Mallinger, K., Neubauer, T., & Weippl, E. (2024). Tabular Reinforcement learning for Robust, Explainable CropRotation Policies Matching Deep Reinforcement LearningPerformance. In EGU General Assembly 2024. EGU General Assembly 2024, Wien, Austria. EGU. https://doi.org/10.5194/egusphere-egu24-9018 ( reposiTUm)
Kieseberg, P., Weippl, E., Tjoa, A. M., Cabitza, F., Campagner, A., & Holzinger, A. (2023). Controllable AI - An Alternative to Trustworthiness in Complex AI Systems? In A. Holzinger, P. Kieseberg, & F. Cabitza (Eds.), Machine Learning and Knowledge Extraction : 7th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2023, Benevento, Italy, August 29 – September 1, 2023, Proceedings (pp. 1–12). Springer. https://doi.org/10.1007/978-3-031-40837-3_1 ( reposiTUm)
Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2022). How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks. In WWW ’22: Companion Proceedings of the Web Conference 2022 (pp. 467–477). ACM. https://doi.org/10.1145/3487553.3524627 ( reposiTUm)
Holzinger, A., Weippl, E., Tjoa, A. M., & Kieseberg, P. (2021). Digital Transformation for Sustainable Development Goals (SDGs) - A Security, Safety and Privacy Perspective on AI. In Machine Learning and Knowledge Extraction (pp. 1–20). Springer. http://hdl.handle.net/20.500.12708/55662 ( reposiTUm)
Schindler, P., Judmayer, A., Hittmeir, M., Stifter, N., & Weippl, E. (2021). RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. In Proceedings 2021 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium (NDSS) Symposium 2021, Unknown. Internet Society. https://doi.org/10.14722/ndss.2021.24116 ( reposiTUm)
Ghesmati, S., Kern, A., Judmayer, A., Stifter, N., & Weippl, E. (2021). Unnecessary Input Heuristics and PayJoin Transactions. In HCI International 2021 - Posters (pp. 416–424). https://doi.org/10.1007/978-3-030-78642-7_56 ( reposiTUm)
Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 533–549). Springer. https://doi.org/10.1007/978-3-662-63958-0_39 ( reposiTUm)
Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gaži, P., Meiklejohn, S., & Weippl, E. (2021). SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. In Financial Cryptography and Data Security. FC 2021 International Workshops (pp. 507–532). Springer. https://doi.org/10.1007/978-3-662-63958-0_38 ( reposiTUm)
Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2020). HydRand: Efficient Continuous Distributed Randomness. In 2020 IEEE Symposium on Security and Privacy (SP). 2020 IEEE Symposium on Security and Privacy, San Francisco, CA, United States of America (the). https://doi.org/10.1109/sp40000.2020.00003 ( reposiTUm)
Mai, A., Pfeffer, K., Gusenbauer, M., Weippl, E., & Krombholz, K. (2020). User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) (pp. 341–358). USENIX Association. http://hdl.handle.net/20.500.12708/153349 ( reposiTUm)
Stifter, N., Eckhart, M., Brenner, B., & Weippl, E. (2019). “Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems.” In Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain. IEEE. http://hdl.handle.net/20.500.12708/58103 ( reposiTUm)
Eckhart, M., Ekelhart, A., Lüder, A., Biffl, S., & Weippl, E. (2019). Security Development Lifecycle for Cyber-Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal. IEEE. http://hdl.handle.net/20.500.12708/58114 ( reposiTUm)
Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process. In IEEE (pp. 3012–3017). IEEE. http://hdl.handle.net/20.500.12708/58116 ( reposiTUm)
Dabrowski, A., Merzdovnik, G., Ullrich, J., Sendera, G., & Weippl, E. (2019). Measuring Cookies and Web Privacy in a Post-GDPR World. In Passive and Active Measurement (pp. 258–270). Springer, Cham. http://hdl.handle.net/20.500.12708/58117 ( reposiTUm)
Brenner, B., Ekelhart, A., & Weippl, E. (2019). A versatile Security Layer for AutomationML. In Proceedings of INDIN 2019. 17th IEEE International Conference on Industrial Informatics (INDIN 2019), Helsinki, Finland. IEEE. http://hdl.handle.net/20.500.12708/58078 ( reposiTUm)
Brenner, B., Weippl, E., & Ekelhart, A. (2019). Security Related Technical Debt in Cyber Physical Production Systems. In IEEE. 45th Annual Conference of the IEEE Industrial Electronics Society (IECON 2019), Lisbon, Portugal. IEEE. http://hdl.handle.net/20.500.12708/58105 ( reposiTUm)
Eckhart, M., Ekelhart, A., & Weippl, E. (2019). Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins. In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2019), Zaragoza, Spain. IEEE. https://doi.org/10.1109/etfa.2019.8869197 ( reposiTUm)
Stifter, N., Schindler, P., Judmayer, A., Zamyatin, A., Kern, A., & Weippl, E. (2019). Echoes of the Past: Recovering Blockchain Metrics from Merged mining. In Financial Cryptography and Data Security. 23rd International Conference, FC 2019, St. Kitts, United States of America (the). Springer. http://hdl.handle.net/20.500.12708/58072 ( reposiTUm)
Schindler, P., Judmayer, A., Stifter, N., & Weippl, E. (2019). Distributed Key Generation with Ethereum Smart Contracts. In Consumer Identity World EU 2019. Consumer Identity World EU 2019, Amsterdam, Netherlands (the). Springer. http://hdl.handle.net/20.500.12708/58084 ( reposiTUm)
Kieseberg, P., & Weippl, E. (2018). Security Challenges in Cyber-Physical Production Systems. In Software Quality: Methods and Tools for Better Software and Systems (pp. 3–16). Springer Lecture Notes in Business Information Processing. http://hdl.handle.net/20.500.12708/57496 ( reposiTUm)
Neuner, S., Voyiatzis, A. G., Fotopoulos, S., Mulliner, C., & Weippl, E. (2018). USBlock: Blocking USB-Based Keypress Injection Attacks. In Data and Applications Security and Privacy XXXII (pp. 278–295). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57497 ( reposiTUm)
Judmayer, A., Stifter, N., Schindler, P., & Weippl, E. (2018). Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. In Springer Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 197–206). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57491 ( reposiTUm)
Ullrich, J., Stifter, N., Judmayer, A., Dabrowski, A., & Weippl, E. (2018). Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. In Research in Attacks, Intrusions, and Defenses (pp. 184–203). Springer in the Lecture Notes in Computer Science series. http://hdl.handle.net/20.500.12708/57447 ( reposiTUm)
Mayer, W., Schreiber, T., & Weippl, E. (2018). A Framework for Monitoring Net Neutrality. In The 13th International Conference on Availability, Reliability and Security (ARES 2018). The 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany. ACM International Conference Proceeding Series. http://hdl.handle.net/20.500.12708/57445 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., & Weippl, E. (2018). Structural Limitations of B+-Tree forensics. In Proceedings of the Central European Cybersecurity Conference 2018. Central European Cybersecurity Conference 2018, Ljubljana, Slovenia. ACM Digital Library. https://doi.org/10.1145/3277570.3277579 ( reposiTUm)
Holzinger, A., Kieseberg, P., Weippl, E., & Tjoa, A. M. (2018). Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. In CD-MAKE 2018: Machine Learning and Knowledge Extraction - Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference (pp. 1–8). Springer. http://hdl.handle.net/20.500.12708/58777 ( reposiTUm)
Zamyatin, A., Stifter, N., Judmayer, A., Schindler, P., Weippl, E., & Knottenbelt, W. (2018). A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. In Proceedings of Bitcoin 2018. 5th Workshop on Bitcoin and Blockchain Research at Financial Cryptography and Data Security 2018, Curaçao. Sprinter Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57678 ( reposiTUm)
Krombholz, K., Mayer, W., Mulazzani, M., & Weippl, E. (2017). I Have No Idea What I’m Doing - On the Usability of Deploying HTTPS. In Proceedings of the 26th USENIX Security Symposium. 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, Canada, Canada. http://hdl.handle.net/20.500.12708/56967 ( reposiTUm)
Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., & Weippl, E. (2017). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). 2nd IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France. http://hdl.handle.net/20.500.12708/56974 ( reposiTUm)
Neuner, S., Voyiatzis, A. G., Schmiedecker, M., & Weippl, E. (2017). Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy. http://hdl.handle.net/20.500.12708/56971 ( reposiTUm)
Kieseberg, P., Neuner, S., Schrittwieser, S., Schmiedecker, M., & Weippl, E. (2017). Real-time forensics through endpoint visibility. In Proceedings of the 9th EAI International Conference on Digital Forensics & Cyber Crime. 9th EAI International Conference on Digital Forensics & Cyber Crime, Prag, Czechia. LNICST SpringerLink Digital Library. http://hdl.handle.net/20.500.12708/57200 ( reposiTUm)
Judmayer, A., Ullrich, J., Merzdovnik, G., Voyiatzis, A. G., & Weippl, E. (2017). Lightweight Address Hopping for Defending the IPv6 IoT. In Proceedings of ARES 2017 (ACM International Conference Proceedings Series). 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy. http://hdl.handle.net/20.500.12708/56973 ( reposiTUm)
Dabrowski, A., Ullrich, J., & Weippl, E. (2017). Grid Shock: Coordinated Load-Changing Attacks on Power Grids. In Proceedings of the 2017 Annual Computer Security Applications Conference. Annual Computer Security Applications Conference (ACSAC), Miami, United States of America (the). http://hdl.handle.net/20.500.12708/57199 ( reposiTUm)
Machida, S., Dabrowski, A., Weippl, E., & Echizen, I. (2017). PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. In I3E 2017: Digital Nations - Smart Cities, Innovation, and Sustainability (pp. 261–275). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57198 ( reposiTUm)
Dabrowski, A., Petzl, G., & Weippl, E. (2016). The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. In RAID 2016: Research in Attacks, Intrusions, and Defenses (pp. 279–302). Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/57202 ( reposiTUm)
Ullrich, J., & Weippl, E. (2016). The beauty or the beast? Attacking rate limits of the xen hypervisor. In Computer Security - ESORICS 2016, Part II (pp. 493–512). http://hdl.handle.net/20.500.12708/57203 ( reposiTUm)
Krombholz, K., Frühwirt, P., Rieder, T., Kapsalis, I., Ullrich, J., & Weippl, E. (2015). QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 230–237). IEEE. http://hdl.handle.net/20.500.12708/56201 ( reposiTUm)
Ullrich, J., Kieseberg, P., Krombholz, K., & Weippl, E. (2015). On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 186–192). IEEE. http://hdl.handle.net/20.500.12708/56202 ( reposiTUm)
Dabrowski, A., Krombholz, K., Weippl, E., & Echizen, I. (2015). Smart Privacy Visor: Bridging the Privacy Gap. In Business Information Systems Workshops - BIS 2015 International Workshops (pp. 235–247). Springer International Publishing. http://hdl.handle.net/20.500.12708/56208 ( reposiTUm)
Buhov, D., Huber, M., Merzdovnik, G., Weippl, E., & Dimitrova, V. (2015). Network Security Challenges in Android Applications. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 327–332). IEEE. http://hdl.handle.net/20.500.12708/56236 ( reposiTUm)
Neuner, S., Mulazzani, M., Schrittwieser, S., & Weippl, E. (2015). Gradually Improving the Forensic Process. In Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES) (pp. 404–410). IEEE. http://hdl.handle.net/20.500.12708/56235 ( reposiTUm)
Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., & Kastner, W. (2015). Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education. 2015 USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE 15), Washington, D.C., United States of America (the). USENIX. http://hdl.handle.net/20.500.12708/56210 ( reposiTUm)
Ullrich, J., & Weippl, E. (2015). Privacy is Not an Option: Attacking the IPv6 Privacy Extension. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID) (pp. 448–468). Springer Lecture Notes in Computer Science. http://hdl.handle.net/20.500.12708/56173 ( reposiTUm)
Krombholz, K., Frauenberger, C., & Weippl, E. (2015). Privacy for Everyone: Towards an Inclusive Design Approach for Accessible Privacy and Security Technology. In SOUPS ’15 Full Proceedings. Workshop on Inclusive Privacy and Security (WIPS), Symposium On Usable Privacy and Security 2015 (SOUPS 2015), Ottawa, Canada. USENIX. http://hdl.handle.net/20.500.12708/56200 ( reposiTUm)
Krombholz, K., Dabrowski, A., Smith, M., & Weippl, E. (2015). Ok Glass, Leave me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security FC 2015 International Workshops. 1st Workshop on Wearable Security and Privacy, Financial Crypto 2015, Puerto Rico, United States of America (the). Springer. http://hdl.handle.net/20.500.12708/56198 ( reposiTUm)
Dabrowski, A., Echizen, I., & Weippl, E. (2015). Error-Correcting Codes as Source for Decoding Ambiguity. In Proceedings of the 2nd Workshop on Language Theoretic Security (LangSec). 2nd Workshop on Language Theoretic Security (LangSec), IEEE Security & Privacy, San Jose, United States of America (the). http://hdl.handle.net/20.500.12708/56209 ( reposiTUm)
Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., & Holzinger, A. (2014). Protecting Anonymity in Data-Driven Biomedical Science. In A. Holzinger & I. Jurisica (Eds.), Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 301–316). Springer-Verlag. https://doi.org/10.1007/978-3-662-43968-5_17 ( reposiTUm)
Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., & Weippl, E. (2014). IPv6 Security: Attacks and Countermeasures in a Nutshell. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (p. 11). USENIX Association. http://hdl.handle.net/20.500.12708/43399 ( reposiTUm)
Frühwirt, P., Kieseberg, P., Hochreiner, C., Schrittwieser, S., & Weippl, E. (2014). InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. In GI Sicherheit 2014. GI Sicherheit 2014, Wien, Austria. http://hdl.handle.net/20.500.12708/55951 ( reposiTUm)
Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014). IMSI-Catch Me If You Can: IMSI-Catcher-Catchers. In Annual Computer Security Applications Conference (ACSAC). Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/55950 ( reposiTUm)
Dabrowski, A., Krombholz, K., Ullrich, J., & Weippl, E. (2014). QR - Inception: Barcode in Barcode Attacks. In ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 4th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Scottsdale, Arizona, USA, Non-EU. http://hdl.handle.net/20.500.12708/55952 ( reposiTUm)
Kadluba, C., Mulazzani, M., Zechner, L., Neuner, S., & Weippl, E. (2014). Windows Installer Security. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55975 ( reposiTUm)
Dabrowski, A., Hobel, H., Ullrich, J., Krombholz, K., & Weippl, E. (2014). Towards a Hardware Trojan Detection Cycle. In International Workshop on Emerging Cyberthreats and Countermeasures. International Workshop on Emerging Cyberthreats and Countermeasures, ARES ECTCM 2014, Fribourg, Switzerland, Non-EU. http://hdl.handle.net/20.500.12708/55977 ( reposiTUm)
Khue, V. S., Anjomshoaa, A., & Tjoa, A. M. (2014). Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE. In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Availability, Reliability, and Security in Information Systems (pp. 138–154). Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6_10 ( reposiTUm)
Frühwirt, P., Schrittwieser, S., & Weippl, E. (2014). Using machine learning techniques for traffic classification and preliminary surveying of an attackers profile. In International Conference on Privacy, Security, Risk and Trust. ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA, Non-EU. http://hdl.handle.net/20.500.12708/55970 ( reposiTUm)
Hochreiner, C., Ma, Z., Kieseberg, P., Schrittwieser, S., & Weippl, E. (2014). Using Model Driven Security Approaches in Web Application Development. In Asian Conference on Availability, Reliability and Security. AsiaARES (The 2014 Asian Conference on Availability, Reliability and Security), Bali, Indonesia, Non-EU. http://hdl.handle.net/20.500.12708/55972 ( reposiTUm)
Aufner, P., Merzdovnik, G., Huber, M., & Weippl, E. (2014). Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. In Proceedings of the 7th International Conference on Security of Information and Networks (pp. 434–440). ACM Digital Library. http://hdl.handle.net/20.500.12708/56238 ( reposiTUm)
Falkner, S., Kieseberg, P., Simos, D. E., Traxler, C., & Weippl, E. (2014). E-voting authentication with QR-codes. In Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 149–159). Springer. http://hdl.handle.net/20.500.12708/56197 ( reposiTUm)
Hudic, A., Krombholz, K., Otterbein, T., Platzer, C., & Weippl, E. (2014). Automated Analysis of Underground Marketplaces. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55966 ( reposiTUm)
Winter, P., Köwer, R., Mulazzani, M., Huber, M., Schrittwieser, S., Lindskog, S., & Weippl, E. (2014). Spoiled Onions: Exposing Malicious Tor Exit Relays. In Privacy Enhancing Technologies Symposium. Privacy Enhancing Technologies Symposium (PETS), Amsterdam, Netherlands, EU. http://hdl.handle.net/20.500.12708/55959 ( reposiTUm)
Beyer, S., Mulazzani, M., Schrittwieser, S., Huber, M., & Weippl, E. (2014). Towards Fully Automated Digital Alibis with Social Interaction. In Research Advances in Digital Forensics. Annual IFIP WG 11.9 International Conference on Digital Forensics, Wien, Austria. http://hdl.handle.net/20.500.12708/55965 ( reposiTUm)
Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., & Weippl, E. (2014). QR Code Security: A Survey of Attacks and Challenges for Usable Security. In Human Aspects of Information Security, Privacy, and Trust (pp. 79–90). Springer. https://doi.org/10.1007/978-3-319-07620-1_8 ( reposiTUm)
Neuner, S., van der Veen, V., Lindorfer, M., Huber, M., Georg, M., Mulazzani, M., & Weippl, E. (2014). Enter Sandbox: Android Sandbox Comparison. In Proceedings of the IEEE Mobile Security Technologies Workshop (MoST). IEEE. http://hdl.handle.net/20.500.12708/55124 ( reposiTUm)
Hobel, H., Heurix, J., Anjomshoaa, A., & Weippl, E. (2013). Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. In Security and Privacy Protection in Information Processing Systems (pp. 286–299). Springer-Verlag GmbH. https://doi.org/10.1007/978-3-642-39218-4_22 ( reposiTUm)
Islam, S., Mouratidis, H., & Weippl, E. (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In Security Engineering for Cloud Computing: Approaches and Tools (pp. 97–122). IGI Global. http://hdl.handle.net/20.500.12708/55063 ( reposiTUm)
Huber, M., Schrittwieser, S., Mulazzani, M., & Weippl, E. (2013). Appinspect: large-scale evaluation of social networking apps. In Proceedings of the first ACM conference on Online social networks (pp. 143–154). http://hdl.handle.net/20.500.12708/54987 ( reposiTUm)
Schrittwieser, S., Mulazzani, M., Weippl, E., & Panhans, S. (2013). Ethik in der Sicherheitsforschung. In D-A-CH Security 2013. DACH Security 2013, Nürnberg, EU. http://hdl.handle.net/20.500.12708/54988 ( reposiTUm)
Mulazzani, M., Neuner, S., Schrittwieser, S., Weippl, E., Kieseberg, P., & Huber, M. (2013). Quantifying Windows File Slack in Size and Stability. In Advances in Digital Forensics IX. Springer. http://hdl.handle.net/20.500.12708/54989 ( reposiTUm)
Craß, S., Dönz, T., Joskowicz, G., Kühn, E., & Marek, A. (2013). Securing a Space-Based Service Architecture with Coordination-Driven Access Control. In E. Weippl, A. M. Tjoa, & S. Tjoa (Eds.), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Special Issue on Frontiers in Security and Dependability (p. 22). Innovative Information Science & Technology Research Group (ISYOU). http://hdl.handle.net/20.500.12708/54974 ( reposiTUm)
Mulazzani, M., Weippl, E., Schrittwieser, S., Unger, T., Huber, M., & Frühwirt, D. (2013). SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES). Eighth International Conference on Availability, Reliability and Security (ARES), Regensburg, EU. http://hdl.handle.net/20.500.12708/54985 ( reposiTUm)
Schrittwieser, S., Huber, M., Leithner, M., Mulazzani, M., Katzenbeisser, S., Weippl, E., & Kieseberg, P. (2013). Covert Computation - Hiding Code in Code for Obfuscation Purposes. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ASIA CCS ’13 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, Non-EU. http://hdl.handle.net/20.500.12708/54990 ( reposiTUm)
Herzberg, A., Shulman, H., Ullrich, J., & Weippl, E. (2013). Cloudoscopy: Services Discovery and Topology Mapping. In Fifth ACM cloud computing security workshop (CCSW 2013) (pp. 113–122). http://hdl.handle.net/20.500.12708/54996 ( reposiTUm)
Asfand-e-yar, M., & Tjoa, A. M. (2013). Using Semantic Web to Enhance User Understandability for Online Shopping License Agreement. In K. Mustofa, E. Neuhold, A. M. Tjoa, E. Weippl, & I. You (Eds.), Information and Communication Technology International Conference, ICT-EurAsia 2013 (pp. 233–242). Springer LNCS. https://doi.org/10.1007/978-3-642-36818-9_24 ( reposiTUm)
Schwaiger, W., & Abmayer, M. (2013). Accounting and Management Information Systems: A Semantic Integration. In G. Kotsis, E. Weippl, M. Steinbauer, I. Khalil, & M. Indrawan-Santiago (Eds.), iiWAS2013; (pp. 346–352). The Association for Computing Machinery. http://hdl.handle.net/20.500.12708/66873 ( reposiTUm)
Schrittwieser, S., Kieseberg, P., & Weippl, E. (2012). Digital Forensics for Enterprise Rights Management Systems. In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services (iiWAS) (p. 10). ACM. http://hdl.handle.net/20.500.12708/54523 ( reposiTUm)
Bader, G., Anjomshoaa, A., & Tjoa, A. M. (2012). A Context-Aware Mashup Integration Guideline for Enterprise 2.0. In G. Quirchmayr, J. Basl, I. You, L. Xu, & E. R. Weippl (Eds.), Multidisciplinary Research and Practice for Informations Systems : IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012, Proceedings (pp. 17–30). Lecture Notes in Computer Science (LNCS) / Springer Verlag. https://doi.org/10.1007/978-3-642-32498-7_2 ( reposiTUm)
Schrittwieser, S., Frühwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2012 (p. 9). The Internet Society. http://hdl.handle.net/20.500.12708/54519 ( reposiTUm)
Frühwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., & Weippl, E. (2012). InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. In Proceedings of the Seventh International Conference on Availability, Reliability and Security (ARES) (pp. 625–633). IEEE. http://hdl.handle.net/20.500.12708/54520 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Mulazzani, M., Huber, M., & Weippl, E. (2011). Trees Cannot Lie: Using Data Structures for Forensics Purposes. In Proceedings of the European Intelligence and Security Informatics Conference. European Intelligence and Security Informatics Conference 2011, Athens, EU. http://hdl.handle.net/20.500.12708/53934 ( reposiTUm)
Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., & Weippl, E. (2011). An Algorithm for k-anonymity-based Fingerprinting. In Proceedings of the 10th International Workshop on Digital-forensics and Watermarking. International Workshop on Digital-forensics and Watermarking, Atlantic City, USA, Non-EU. http://hdl.handle.net/20.500.12708/53927 ( reposiTUm)
Mulazzani, M., Schrittwieser, S., Huber, M., Leithner, M., & Weippl, E. (2011). Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of 20th USENIX Security Symposium. Usenix Security Symposium, Baltimore, USA, Austria. http://hdl.handle.net/20.500.12708/53926 ( reposiTUm)
Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of 27th Annual Computer Security Applications Conference (ACSAC) (pp. 113–122). http://hdl.handle.net/20.500.12708/53929 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Morgan, L., Mulazzani, M., Huber, M., & Weippl, E. (2011). Using the Structure of B+ Trees for Enhancing Logging Mechanisms of Databases. In Proceedings of the 13th International Conference on Information Integration and Web-based Applications & Services. IIWAS International Conference on Information Integration, Web-Applications and Services, Yogyakarta Indonesien, Non-EU. http://hdl.handle.net/20.500.12708/53930 ( reposiTUm)
Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., & Weippl, E. (2011). Cloud Speicherdienste als Angriffsvektoren. In Proceedings of 9. Sicherheitskonferenz Krems. Sicherheitskonferenz Krems, Krems, Austria. http://hdl.handle.net/20.500.12708/53931 ( reposiTUm)
Tahamtan, A., Anjomshoaa, A., Weippl, E., & Tjoa, A. M. (2010). A SOM-Based Technique for a User-Centric Content Extraction and Classification of Web 2.0 with a Special Consideration of Security Aspects: In Knowledge Science, Engineering & Management (pp. 412–423). Springer. http://hdl.handle.net/20.500.12708/53315 ( reposiTUm)
Ahmed, M., & Weippl, E. (2010). Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. In Proceedings of the Fifth International Conference on Availability, Reliability and Security (ARES), Workshop on Frontiers in Availability, Reliability and Security (FARES 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52979 ( reposiTUm)
Anjomshoaa, A., Khue, V. S., Tjoa, A. M., Weippl, E., & Michael, H. (2010). Context Oriented Analysis of Web 2.0 Social Network Contents - MindMeister Use-case. In Proceedings of the Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010) (pp. 180–189). Springer. http://hdl.handle.net/20.500.12708/52975 ( reposiTUm)
Sunindyo, W. D., Biffl, S., Frühwirth, C., Mordinyi, R., Moser, T., Schatten, A., Schrittwieser, S., Weippl, E., & Winkler, D. (2010). Defect Detection Using Event-Based Process Analysis in (Software+) Engineering Projects. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th Euromicro Conference Software Engineering and Advanced Applications (SEAA 2010) - Work in Progress Session (pp. 1–2). COREP Vauban. http://hdl.handle.net/20.500.12708/53214 ( reposiTUm)
Frühwirth, C., Biffl, S., Schatten, A., Schrittwieser, S., Weippl, E., & Sunindyo, W. D. (2010). Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform. In E. Grosspietsch & K. Klöckner (Eds.), Proc. 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA) - Work in Progress Session (pp. 1–2). http://hdl.handle.net/20.500.12708/53188 ( reposiTUm)
Racz, N., Seufert, A., & Weippl, E. (2010). A process model for integrated IT governance, risk, and compliance management. In Proceedings of the Ninth Baltic Conference on Databases and Information Systems (DB&IS 2010) (pp. 155–170). http://hdl.handle.net/20.500.12708/53519 ( reposiTUm)
Racz, N., Seufert, A., & Weippl, E. (2010). A Frame of Reference for Research of Integrated Governance, Risk & Compliance (GRC). In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53520 ( reposiTUm)
Racz, N., Panitz, J., Amberg, M., Weippl, E., & Seufert, A. (2010). Governance, Risk & Compliance (GRC) Status Quo and Software Use: Results from a Survey among Large Enterprises. In Proceedings of the 21st Australasian Conference on Information Systems (ACIS). ACIS 2010, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53504 ( reposiTUm)
Farman, A. K., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Role of Learning Styles & Affective States in Web-based Adaptive Learning Environments. In Proceedings of EDMEDIA 2010. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/53507 ( reposiTUm)
Racz, N., Seufert, A., & Weippl, E. (2010). Questioning the need for separate IT risk management frameworks. In Konferenz Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Lecture Notes in Informatics (LNI), P-176, Informatik 2010 Proceedings, Band 2. Risk Management, Compliance und Governance für widerstandsfähige Informationssysteme, Leipzig, EU. Springer LNI. http://hdl.handle.net/20.500.12708/53506 ( reposiTUm)
Khan, F. A., Graf, S., Weippl, E., & Tjoa, A. M. (2010). Implementation of Affective States and Learning Styles Tactics in Web-based Learning Management Systems. In Proceedings of 10th IEEE International Conference on Advanced Learning Technologies (pp. 734–735). http://hdl.handle.net/20.500.12708/53736 ( reposiTUm)
Fruehwirth, C., Biffl, S., Tabatabai, M., & Weippl, E. (2010). Addressing misalignment between information security metrics and business-driven security objectives. In G. Succi, M. Morisio, & N. Nagappan (Eds.), Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec ’10. https://doi.org/10.1145/1853919.1853927 ( reposiTUm)
Sunindyo, W. D., Biffl, S., Mordinyi, R., Moser, T., Schatten, A., Tabatabai, M., Wahyudin, D., Weippl, E., & Winkler, D. (2010). An event-based empirical process analysis framework. In Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM ’10. 4th International Symposium on Empirical Software Engineering and Measurement (ESEM 2010) - Poster Sessions, Bolzano-Bozen, Italy, EU. https://doi.org/10.1145/1852786.1852867 ( reposiTUm)
Frühwirt, P., Huber, M., Mulazzani, M., & Weippl, E. (2010). InnoDB Database Forensics. In Proceedings of the 24th International Conference on Advanced Information Networking and Applications (AINA 2010). IEEE Press. http://hdl.handle.net/20.500.12708/52981 ( reposiTUm)
Mulazzani, M., Huber, M., & Weippl, E. (2010). Tor HTTP usage and information leakage. In Proceedings of IFIP CMS 2010. Proceedings of IFIP CMS 2010, Linz, Austria. http://hdl.handle.net/20.500.12708/53521 ( reposiTUm)
Huber, M., Mulazzani, M., & Weippl, E. (2010). Who On Earth Is Mr. Cypher? Automated Friend Injection Attacks on Social Networking Sites. In Proceedings of the IFIP International Information Security Conference 2010: Security \& Privacy --- Silver Linings in the Cloud. IFIP International Information Security Conference 2010: Security & Privacy --- Silver Linings in the Cloud, Brisbane, Australia, Non-EU. http://hdl.handle.net/20.500.12708/53518 ( reposiTUm)
Farman, A. K., & Weippl, E. (2009). An Approach for Identifying Affective States through Behavioral Patterns in Web-based Learning Management System. In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009). IIWAS, Austria. ACM. http://hdl.handle.net/20.500.12708/52977 ( reposiTUm)
Asfand-e-yar, M., Anjomshoaa, A., Weippl, E. R., & Tjoa, A. M. (2009). Blending the Sketched Use Case Scenario with License Agreements Using Semantics. In Knowledge Science, Engineering and Management (pp. 275–284). Springer, LNAI. https://doi.org/10.1007/978-3-642-10488-6_28 ( reposiTUm)
Weippl, E., Tjoa, A. M., Graf, S., & Farman, A. K. (2009). Integrated Approach for the Detection of Learning Styles & Affective States. In Proceedings of ED-MEDIA 2009 (pp. 753–761). http://hdl.handle.net/20.500.12708/52670 ( reposiTUm)
Weippl, E., & Schnabl, S. (2009). Screen Recording for E-Learning. In Proceedings of ED-MEDIA 2009 (pp. 1271–1277). http://hdl.handle.net/20.500.12708/52671 ( reposiTUm)
Irani, M. T., & Weippl, E. R. (2009). Automation of Post-exploitation. In Security Technology (pp. 250–257). Springer LNCS. https://doi.org/10.1007/978-3-642-10847-1_31 ( reposiTUm)
Kalchgruber, P., & Weippl, E. (2009). Can End-to-End Verifiable E-Voting be Explained Easily? In Proceedings of the 11th International Conference on Information Integration and Web Based Applications and Services (iiWAS2009), Workshop on Emerging Research Projects, Applications and Services (ERPAS2009). IIWAS, Austria. ACM Press. http://hdl.handle.net/20.500.12708/52980 ( reposiTUm)
Obermüller, E., & Krameritsch, J. (2008). Hypertext as incentive for dialogical learning: How students from different faculties learn from a painting and with each other. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (p. 8). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77782 ( reposiTUm)
Csanyi, G. (2008). The Learning Process According to the Brain. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia & Telecommunications (pp. 2342–2347). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77759 ( reposiTUm)
Reichl, F., Csanyi, G., Herbst, I., Hruska, A., Obermüller, E., Fröhlich, J., Michalek, C.-R., & Spiegl, A. (2008). Delta 3 - A Strategic E-Education Project Creating Added Value from Complementarity. In J. Luca & E. Weippl (Eds.), Proceedings of ED-MEDIA 2008 World Conference on Educational Multimedia, Hypermedia and Telecommunications (pp. 465–473). Association for the Advancement of Computing in Education (AACE). http://hdl.handle.net/20.500.12708/77769 ( reposiTUm)
Ekelhart, A., Weippl, E., & Fenz, S. (2008). Semantic Potential of existing Security Advisory Standards. In Inproceedings of the FIRST 2008. The Forum of Incident Response and Security Teams (FIRST), Vancouver, Non-EU. http://hdl.handle.net/20.500.12708/52160 ( reposiTUm)
Purgathofer, P., & Reinthaler, W. (2008). Massive “Multiplayer” E-Learning. In E. Weippl & J. Luca (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2008 (p. 9). AACE. http://hdl.handle.net/20.500.12708/52509 ( reposiTUm)
Weippl, E., Fenz, S., & Ekelhart, A. (2008). Fortification of IT Security by Automatic Security Advisory Processing. In 22nd International Conference on Advanced Information Networking and Applications (aina 2008). 22nd International Conference on Advanced Information Networking and Applications AINA 2008, Okinawa, Japan, Non-EU. IEEE Computer Society. https://doi.org/10.1109/aina.2008.69 ( reposiTUm)
Weippl, E. (2008). Chair’s Message. In Proceedings of the The Third International Conference on Availability, Security, and Reliability ARES 2008. IEEE Computer Society Press. https://doi.org/10.1109/ARES.2008.4 ( reposiTUm)
Fenz, S., Ekelhart, A., Klemen, M., & Weippl, E. (2007). Security Ontologies: Improving Quantitative Risk Analysis. In HICSS 2007 (pp. 156–162). http://hdl.handle.net/20.500.12708/51565 ( reposiTUm)
Abramowicz, W., Ekelhart, A., Fenz, S., Kaczmarek, M., Tjoa, A. M., Weippl, E., & Zyskowski, D. (2007). Security Aspects In Semantic Web Services Filtering. In Proceedings of The 9th International Conference on Information Integration and Web-based Applications and Services (iiWAS2007) (pp. 21–31). http://hdl.handle.net/20.500.12708/51916 ( reposiTUm)
Riedl, B., Goluch, G., Pöchlinger, S., & Weippl, E. (2007). Comparative Literature Review on RFID Security and Privacy. In Proceedings of the 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS 2007). 9th International Conference on Information Integration and Web-based Applications & Services (iiWAS2007), Jarkata, Indonesien, Non-EU. Österreichische Computer Gesellschaft. http://hdl.handle.net/20.500.12708/51858 ( reposiTUm)
Fenz, S., Goluch, G., Ekelhar, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007). 13th Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, Non-EU. Springer. https://doi.org/10.1109/prdc.2007.29 ( reposiTUm)
Weippl, E., Latif, K., & Tjoa, A. M. (2007). Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse. In IEEE International Conference on Information Reuse and Integration (pp. 170–176). http://hdl.handle.net/20.500.12708/51807 ( reposiTUm)
Weippl, E., Fenz, S., & Ekelhart, A. (2007). Security Ontologies: How to Improve Understanding of Complex Relationships. In Ed Media 2007 (pp. 404–407). http://hdl.handle.net/20.500.12708/51804 ( reposiTUm)
Ekelhart, A., Fenz, S., Tjoa, A. M., & Weippl, E. R. (2007). Security Issues for the Use of Semantic Web in E-Commerce. In Business Information Systems (pp. 1–13). Springer. https://doi.org/10.1007/978-3-540-72035-5_1 ( reposiTUm)
Ekelhart, A., Fenz, S., Neubauer, T., & Weippl, E. (2007). Formal Threat Descriptions for Enhancing Governmental Risk Assessment. In Proceedings of the First International Conference on Theory and Practice of Eletronic Governance (ICEGOV2007) (pp. 40–43). ACM Press. http://hdl.handle.net/20.500.12708/53161 ( reposiTUm)
Ekelhart, A., Fenz, S., Goluch, G., & Weippl, E. (2007). Ontological Mapping of Common Criteria’s Security Assurance Requirements. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, IFIPSEC2007 (pp. 85–95). http://hdl.handle.net/20.500.12708/53164 ( reposiTUm)
Neubauer, T., Weippl, E., & Biffl, S. (2006). Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF. In First International Conference on Availability, Reliability and Security (ARES’06) (pp. 723–731). IEEE Computer Society. http://hdl.handle.net/20.500.12708/51391 ( reposiTUm)
Neubauer, T., & Weippl, E. (2006). Workshop-based Multiobjective Security Safeguard Selection. In Proceedings of ARES 2006. IEEE Computer Society, Vienna, Austria. http://hdl.handle.net/20.500.12708/51424 ( reposiTUm)
Weippl, E., & Goluch, G. (2006). Nichtabstreitbarkeit und Audits in ELearning. In IRIS 2006. IRIS, Salzburg, Austria, Austria. http://hdl.handle.net/20.500.12708/51425 ( reposiTUm)
Klemen, M., Weippl, E., Ekelhart, A., & Fenz, S. (2006). Security Ontology: Simulating Threats to Corporate Assets. In Proceedings of the 2nd International Conference on Information Systems Security(ICISS 2006) (pp. 249–259). Springer. http://hdl.handle.net/20.500.12708/51423 ( reposiTUm)
Weippl, E., & Fenz, S. (2006). Ontology-based IT-Security planning. In Proceedings of the 2006 IEEE International Symposium Pacific Rim Dependable Computing (PRDC’06) (pp. 389–390). http://hdl.handle.net/20.500.12708/51421 ( reposiTUm)
Weippl, E. (2006). Addressing the Weakest Link: How to improve teaching of IT security. In Proceedings of EDMEDIA 2006 (pp. 223–227). http://hdl.handle.net/20.500.12708/51422 ( reposiTUm)
Weippl, E. (2006). Digitale PDF-Signaturen mit der Bürgerkarte. In Proceedings of D-A-CH 2006. D-A-CH 2006, Duesseldorf, EU. http://hdl.handle.net/20.500.12708/51426 ( reposiTUm)
Tjoa, A. M., Weippl, E., Klemen, M., Ekelhart, A., & Fenz, S. (2006). Ontology-Based Business Knowledge for Simulating Threats to Corporate Assets. In Proceedings of the 6th International Conference on Practical Aspects of Knowledge Management (pp. 37–48). Springer. http://hdl.handle.net/20.500.12708/176626 ( reposiTUm)
Neubauer, T., Stummer, C., & Weippl, E. (2006). Workshop-based multiobjective security safeguard selection. In First International Conference on Availability, Reliability and Security (ARES’06). First International Conference on Availability, Reliability and Security (ARES’06) 2006, Vienna, Austria. IEEE Computer Society. https://doi.org/10.1109/ares.2006.144 ( reposiTUm)
Weippl, E. (2005). Dependability in e-assessment. In Proceedings of EDMEDIA 2005 (pp. 1674–1679). AACE. http://hdl.handle.net/20.500.12708/51215 ( reposiTUm)
Weippl, E., Klemen, M., & Tjoa, A. M. (2005). Semantic storage: A report on performance and flexibility. In Proceedings of DEXA, LNCS (pp. 586–595). Springer. http://hdl.handle.net/20.500.12708/51213 ( reposiTUm)
Weippl, E. (2005). Non-repudiation and audits in e-learning. In Proceedings of E-Learn 2005 (pp. 1785–1790). http://hdl.handle.net/20.500.12708/51212 ( reposiTUm)
Gahleitner, E., Palkoska, J., & Weippl, E. (2005). On cooperatively creating dynamic ontologies. In Proceedings of the 16th ACM Conference on Hypertext and Hypermedia. Proceedings of the 16th ACM Conference on Hypertext and Hypermedia, Salzburg, Austria. http://hdl.handle.net/20.500.12708/51214 ( reposiTUm)
Weippl, E., & Tjoa, A. M. (2005). Privacy in e-learning: How to implement anonymity. In Proceedings the 3rd ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-05), Workshop on E-Learning Online Communities (eLOC). International Workshop on e-Learning Online Communities - eLOC 2005, Cairo, Non-EU. IEEE Computer Society Press. http://hdl.handle.net/20.500.12708/51217 ( reposiTUm)
Klemen, M., Weippl, E., & Tjoa, A. M. (2005). The semantic desktop: A semantic personal information management system based on rdf and topic maps. In In Proceedings the ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB). ODBIS Workshop, 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Non-EU. ACM. http://hdl.handle.net/20.500.12708/51216 ( reposiTUm)
Kalinyaprak, H., Futschek, G., Blaha, G., & Weippl, E. (2005). E-Learning without Text and Language: A Language-Free Learning Model. In ED-MEDIA 2005. World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA), Montreal, Non-EU. http://hdl.handle.net/20.500.12708/51032 ( reposiTUm)

Beiträge in Büchern

Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Introduction to Security & Quality Improvement in Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30184 ( reposiTUm)
Kieseberg, P., & Weippl, E. (2019). Securing Information against Manipulation in the Production Systems Engineering Process. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30203 ( reposiTUm)
Brenner, B., & Weippl, E. (2019). Security Analysis. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30202 ( reposiTUm)
Stifter, N., Judmayer, A., & Weippl, E. (2019). Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies. In Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/30189 ( reposiTUm)
Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (2019). Conclusion and Outlook on Security and Quality of Complex Cyber-Physical Systems Engineering. In Security and Quality in Cyber-Physical Systems Engineering (pp. 497–507). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_18 ( reposiTUm)
Krieg, C., & Weippl, E. (2013). Malware in Hardware Infrastructure Components. In Advances in IT Early Warning. Fraunhofer IRB Verlag. http://hdl.handle.net/20.500.12708/28197 ( reposiTUm)
Kieseberg, P., Schrittwieser, S., Leithner, M., Mulazzani, M., Weippl, E., Munroe, L., & Sinha, M. (2012). Malicious Pixels: Using QR Codes as Attack Vector. In Trustworthy Ubiquitous Computing (pp. 21–38). Atlantic Press. http://hdl.handle.net/20.500.12708/27834 ( reposiTUm)
Böck, B., & Weippl, E. (2010). Social Engineering. In The Handbook of Technology Management. John Wiley & Sons Ltd. http://hdl.handle.net/20.500.12708/26599 ( reposiTUm)
Weippl, E. (2009). Security in Data Warehouses. In Data Warehousing Design and Advanced Engineering Applications: Methods for Complex Construction (pp. 272–279). IGI Global. http://hdl.handle.net/20.500.12708/26598 ( reposiTUm)
Weippl, E., & Klemen, M. (2008). Improving Storage Concepts for Semantic Models and Ontologies. In The Semantic Web for Knowlege and Data Management: Technologies and Practices (pp. 38–48). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25370 ( reposiTUm)
Weippl, E., & Riedl, B. (2008). Security, Trust and Privacy on Mobile Devices and Multimedia Applications. In Handbook of Research on Mobile Multimedia, Second Edition (pp. 115–131). Information Science Reference. http://hdl.handle.net/20.500.12708/26600 ( reposiTUm)
Weippl, E. (2007). Database Security and Statistical Database Security. In J. Wang (Ed.), Encyclopedia of Data Warehousing and Mining. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25405 ( reposiTUm)
Klemen, M., Neubauer, T., & Weippl, E. (2007). Business Requirements of Backup Systems. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25394 ( reposiTUm)
Klemen, M., & Weippl, E. (2007). Social Engineering. In The Handbook of Computer Networks. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25393 ( reposiTUm)
Weippl, E., & Klemen, M. (2006). Implementing IT Security for Small and Medium-Sized Enterprises. In Enterprise Information Systems Assurance and System Managerial and Technical Issues. Idea Group Publishing. http://hdl.handle.net/20.500.12708/25386 ( reposiTUm)
Weippl, E. (2006). Securing Mobile Communication: RADIUS in a Windows Environment. In Mobile Multimedia: Communication Engineering Perspective (pp. 22–37). Nova Science Publishers. http://hdl.handle.net/20.500.12708/25385 ( reposiTUm)
Weippl, E. (2006). Computer Security in the Context of E-Learning. In Encyclopedia of E-Commerce, E-Government and Mobile Commerce (pp. 135–141). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25371 ( reposiTUm)
Weippl, E. (2006). Security and Trust in Mobile Multimedia. In Handbook of Research on Mobile Multimedia (pp. 22–37). Idea Group Publishing. http://hdl.handle.net/20.500.12708/25369 ( reposiTUm)
Weippl, E. (2005). Security in E-Learning. In The Handbook of Information Security. John Wiley and Sons. http://hdl.handle.net/20.500.12708/25372 ( reposiTUm)

Bücher

Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. R. (Eds.). (2021). Machine Learning and Knowledge Extraction (Vol. 12844). Springer. https://doi.org/10.1007/978-3-030-84060-0 ( reposiTUm)
Biffl, S., Eckhart, M., Lüder, A., & Weippl, E. (Eds.). (2019). Security and Quality in Cyber-Physical Systems Engineering. Springer International Publishing. http://hdl.handle.net/20.500.12708/24652 ( reposiTUm)
Tjoa, A. M., Weippl, E., Kieseberg, P., Holzinger, A., & Buccafurri, F. (Eds.). (2016). Availability, Reliability, and Security in Information Systems. Springer LNCS 9817. https://doi.org/10.1007/978-3-319-45507-5 ( reposiTUm)
Availability, Reliability, and Security in Information Systems. (2014). In S. Teufel, A. M. Tjoa, I. You, & E. Weippl (Eds.), Lecture Notes in Computer Science. Springer LNCS 8708. https://doi.org/10.1007/978-3-319-10975-6 ( reposiTUm)
Avasilcai, S., Tjoa, A. M., Hutu, C. A., & Weippl, E. (Eds.). (2012). QMHE2012. OCG (Österreichische Computer Gesellschaft). http://hdl.handle.net/20.500.12708/23672 ( reposiTUm)
Weippl, E. (2005). Security in E-Learning. Springer. http://hdl.handle.net/20.500.12708/22294 ( reposiTUm)

Tagungsbände

Holzinger, A., Kieseberg, P., Cabitza, F., Campagner, A., Tjoa, A. M., & Weippl, E. (Eds.). (2023). Machine Learning and Knowledge Extraction (Vol. 14065). Springer. https://doi.org/10.1007/978-3-031-40837-3 ( reposiTUm)
Holzinger, A., Kieseberg, P., Tjoa, A. M., & Weippl, E. (Eds.). (2018). Machine Learning and Knowledge Extraction : Second IFIP TC 5, TC 8/WG 8.4, 8.9, TC 12/WG 12.9 International Cross-Domain Conference, CD-MAKE 2018, Hamburg, Germany, August 27–30, 2018, Proceedings (Vol. 11015). Springer. https://doi.org/10.1007/978-3-319-99740-7 ( reposiTUm)
Mustofa, K., Neuhold, E., Tjoa, A. M., Weippl, E., & You, I. (Eds.). (2013). Information and Communicatiaon Technology: Vol. LNCS 7804. Springer. https://doi.org/10.1007/978-3-642-36818-9 ( reposiTUm)
Weippl, E., & Luca, J. (Eds.). (2008). ED-MEDIA Conference Proceedings 2008. AACE. http://hdl.handle.net/20.500.12708/23011 ( reposiTUm)

Präsentationen

Dabrowski, A., Fejes, P., Ullrich, J., Krombholz, K., Hobel, H., & Weippl, E. (2014). Hardware Trojans - Detect and React? Network and Distributed System Security Symposium (NDSS), USA, Non-EU. http://hdl.handle.net/20.500.12708/86009 ( reposiTUm)
Schrittwieser, S., Weippl, E., & Mulazzani, M. (2013). Ethics in Security Research - Which Lines Should Not Be Crossed? Cyber-security Research Ethics Dialog & Strategy Workshop (CREDS 2013), San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85712 ( reposiTUm)
Mulazzani, M., Schrittwieser, S., Reschl, P., Leithner, M., Weippl, E., & Huber, M. (2013). Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Web 2.0 Security & Privacy 2013, San Francisco, Non-EU. http://hdl.handle.net/20.500.12708/85714 ( reposiTUm)
Reschl, P., Mulazzani, M., Huber, M., & Weippl, E. (2011). Poster Abstract: Efficient Browser Identification with JavaScript Engine Fingerprinting. Annual Computer Security Applications Conference (ACSAC), Miami, USA, Non-EU. http://hdl.handle.net/20.500.12708/85219 ( reposiTUm)
Weippl, E. (2007). Forschung und Praxis der Informationssicherheit. University meets Public, Vienna, Austria. http://hdl.handle.net/20.500.12708/84576 ( reposiTUm)

Preprints

Ghesmati, S., Fdhila, W., & Weippl, E. (2022). User-Perceived Privacy in Blockchain. Cryptology ePrint Archive. http://hdl.handle.net/20.500.12708/154453 ( reposiTUm)
Ghesmati, S., Fdhila, W., & Weippl, E. R. (2022). Usability of Cryptocurrency Wallets Providing CoinJoin Transactions. Cryptology ePrint Archive. https://doi.org/10.34726/3604 ( reposiTUm)

Spezialbeiträge

Weippl, E., & Klemen, M. (2004). Content-basierte Zugriffsrechte in E-Learning Systemen. ÖGAI Journal, 23(4), 24–29. http://hdl.handle.net/20.500.12708/174838 ( reposiTUm)

Hochschulschriften

Weippl, E. R. (2008). IT security in the context of e-learning [Professorial Dissertation, Technische Universität Wien]. reposiTUm. http://hdl.handle.net/20.500.12708/182690 ( reposiTUm)